Monday, June 3rd, 2013
When it comes to threats to mobile devices, most people don't think of chargers as a likely point of attack. But plugging in an iPhone — or any smartphone or tablet — could come at a price.
At next month's Black Hat security conference in Las Vegas, three Georgia Institute of ...
Posted in Hardware, Privacy, Security | No Comments
Wednesday, May 29th, 2013
As individuals and organizations digitize more data, they become more susceptible to major data breaches. Though convenient, inexpensive USB flash memory sticks and other portable storage devices certainly don't help the cause, because workers use them transport databases and other confidential information. On top of the real danger of misused ...
Posted in Hardware, Privacy, Security | No Comments
Wednesday, May 22nd, 2013
Today we’re introducing a new security feature to better protect your Twitter account: login verification.
This is a form of two-factor authentication. When you sign in to twitter.com, there’s a second check to make sure it’s really you. You’ll be asked to register a verified phone number and a confirmed email address. To get started, ...
Posted in Internet, Privacy, Security | No Comments
Tuesday, May 21st, 2013
Having control over an email account can be a lot of power, even though most people would probably say they do not care if someone else is reading their private emails. But it’s not always about reading those private emails. Of course there have been quite a few attacks where ...
Posted in Internet, Privacy, Security | No Comments
Saturday, May 18th, 2013
Anyone who uses Skype has consented to the company reading everything they write. The H's associates in Germany at heise Security have now discovered that the Microsoft subsidiary does in fact make use of this privilege in practice. Shortly after sending HTTPS URLs over the instant messaging service, those URLs receive an unannounced ...
Posted in Internet, Privacy, Software | No Comments